Lynx -vulnerabilities- is this permanent?
Jeffrey Goldberg
jeffrey at goldmark.org
Thu Apr 19 02:09:37 UTC 2007
On Apr 18, 2007, at 1:42 PM, [LoN]Kamikaze wrote:
> David Southwell wrote:
>> Hi
>>
>> portupgrade -a produces following output for lynx on cvsup from
>> today.
>> freebsd 6.1
>> -----------------------------------------
>> ---> Upgrading 'lynx-2.8.5_2' to 'lynx-2.8.6_4' (www/lynx)
>> ---> Building '/usr/ports/www/lynx'
>> ===> Cleaning for lynx-2.8.6_4
>> ===> lynx-2.8.6_4 has known vulnerabilities:
>> => lynx -- remote buffer overflow.
>> Reference:
>> <http://www.FreeBSD.org/ports/portaudit/c01170bf-4990-11da-
>> a1b8-000854d03344.html>
>> => Please update your ports tree and try again.
>> *** Error code 1
>>
>> Stop in /usr/ports/www/lynx.
>>
>> Any news or advice forthcoming?
>>
>> david
>
> Did you try a 'portaudit -F'?
I'm having the same problem as David, though I'm on 6.2. Running
portaudit -F
made no difference for me.
-j
--
Jeffrey Goldberg http://www.goldmark.org/jeff/
More information about the freebsd-ports
mailing list